International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 05 | May -2017
p-ISSN: 2395-0072
www.irjet.net
Image Steganography and Data hiding in QR Code Rutuja Kakade1, Nikita Kasar2, Shruti Kulkarni3, Shubham Kumbalpuri4, Sonali Patil5 Student, Dept of Computer Engineering, PCCOE, Maharashtra, India Professor, Dept of Computer Engineering, PCCOE, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------5Associate
Abstract - Sometimes there is a need to keep our data safe
the human senses aren't trained to look for files that have data hidden inside them. Generally, in steganography, the particular data isn't maintained in its original format and thereby it's converted into an alternate equivalent transmission file like image, video or audio that successively is being hidden among another object. This apparent message (known as cover text in usual terms) is sent through the network to the recipient, wherever the particular message is separated from it. Steganography are used to achieve data privacy over secrecy.
and as at many places there is private data which needs to be secured. For this reason steganography is a technique which can be applied. Also we can add data in QR code for the ease of access of sending information. Steganography is using the DWT technique and LSB steganography. The data to be steganographed is encrypted using AES algorithm to enhance the security. Key Words: Information security, Steganography, DWT, AES algorithm, QR code
2. LITERATURE SURVEY
1. INTRODUCTION
2.1 Image steganography with using QR code and cryptography[1]
In this paper QR code and Steganography is used to provide the security to important data.
In this there is image steganographic methodology that's able to embed the encoded secret message using Quick Response Code (QR) code into the image information. Discrete Wavelet Transformation (DWT) domain is employed for the embedding of the QR code, whereas embedding method is in addition secured by Advanced Encryption Standard (AES) cipher algorithmic rule. In additionally, typical characteristics of QR code was broken using the encryption, therefore it makes the method more secure. The relation between security and capability of the strategy was improved by special compression of QR code before the embedding method.
1.1 QR Code QR codes are 2 dimensional matrix. It allows to store a large volume of unique data. Bar-codes are one dimensional vector. So compare to bar-codes QR codes are having more storage capacity. QR codes can hold up to 7,089 numeric characters and up to 4,296 alphanumerical letter values as an information. The following figure shows the structure of a QR code.
2.2 Information Hiding using Image Embedding in QR Codes for Color Images[2] They say that embedding strategies are designed to be compatible with standard decoding applications and might be applied to any color or gray scale image with full space coverage. The embedding technique consists of 2 elements. Initial is that the use of halftoning techniques for the choice of changed pixels to interrupt and reduce the coarse square structure of the QR code and second is that the brightness level level to that the pixels square measure to be remodeled in such some way that it mustn't visible to naked eye on the color image. Later decode the QR code from the color image with minimum errors.
Fig- 1: QR code
1.2 Steganography
2.3 Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System[4]
Steganography is an embedding technique to hide the data in the form of an image or text. the modern-day sense of the word sometimes refers to data or a file that has been hid within a digital image, Video or Audio file. What Steganography basically does is exploit human perception;
Š 2017, IRJET
|
Impact Factor value: 5.181
In this paper, there's totally different methodology, where the marks obtained by a candidate will be encoded in QR Code in encrypted type, so that if an intruder tries to change the
|
ISO 9001:2008 Certified Journal
|
Page 2926